Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

lightning over washington

connected cars ts

White-hat hackers key to securing connected cars

Federal regulator warns of security and privacy risks in connected cars, calling on manufacturers to partner with white-hat hackers to seek out flaws and vulnerabilities.

security fraud

FTC reminder: ‘Spread the word about government imposters’

The FTC is once again asking for help getting the word out about scammers posing as government enforcement agents.

e res id card

Nasdaq to use blockchain to record shareholder votes

Later this year, Nasdaq plans to record stockholders' electronic votes on its own blockchain system for companies listed on its exchange in Estonia. By digitizing the entire process, it expects to speed and simplify the proxy voting...

Henry Ford and Incident Response

Industrialists' ideas about manufacturing operations serve as a good analogue for enterprise CISOs looking to improve IR efficiency.

20151027 vmware sign

Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass

The Pwn2Own hacking contest in March will award security researchers for exploiting Google Chrome, Microsoft Edge, Apple Safari, Flash Player and, for the first time, VMware Workstation.

heart mousetrap

Risky business? Online dating fraud dips during Valentine's Day

Good news, online daters, according to research conducted by device intelligence and fraud prevention company iovation, fraud on online dating sites is lower leading up to Valentine's Day.

Suzan DelBene

ENCRYPT Act co-sponsor learned tech ropes at Microsoft

Rep. Suzan DelBene, one of four congressional sponsors of the ENCRYPT Act, which would preempt state and local laws banning encryption on smartphones, cut her teeth in mobile communications for Microsoft.

Android Security Audit

7 Android tools that can help your personal security

Forget security suites: These seven sensible tools are all you really need on your Android phone to stay safe.

hardware security embedded circuit board integrated controller

Hackers of two Ukrainian utilities probably hit mining and railroad targets, too

The attackers who crippled Ukrainian power operators in December probably committed attacks shortly before against a mining company and a railway operator, Trend Micro said Thursday.

NextNine's security platform helps to reduce industrial cyber risks

Provides a "circle of hardening" to increase the security posture of industrial systems and critical infrastructure

mr robot elliot

With new startup, Check Point Software co-founder bets on perimeter-less security

Check Point Software co-founder Shlomo Kramer has launched a new security company, called Cato Networks, that aims to provide perimeter-less security.

bruce schneier

Schneier: terrorists will switch to more secure alternatives to avoid encryption backdoors

A study shows that if the U.S. mandates backdoors to decrypt secret messages, there are hundreds of alternatives that are made outside the reach of U.S. law.

https encrypted

Which security products do enterprises expect too much from?

Attackers will thank you for enabling them to bypass firewalls and VPNs by allowing infected laptops to send hostile packets through both into your network.

guy in industrial control room

Indegy finds out when industrial controls go bad (think Stuxnet)

Israeli startup Indegy monitors devices on industrial control networks to detect when their configurations have changed as a way to know when the machines are compromised, an attack vector exploited by the Stuxnet worm that took down...

voting new hampshire

Voter targeting becomes voter surveillance

Political campaigns have discovered what marketers of all products know – the better you know your customer, the better you can target the advertising and increase the chances of a sale. But privacy advocates say voter surveillance is...

20151005 cisco headquarters sign

Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Cisco Systems patched a critical vulnerability that could allow remote attackers to take over Cisco Adaptive Security Appliance (ASA) firewalls configured as virtual private network servers by simply sending malformed network packets...

150817 google marshmallow 07

Android root malware widespread in third-party app stores

Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.


Bill filed in Congress would ban encryption backdoors

Four Congressmen are proposing that states be forbidden to ask manufacturers to install encryption backdoors on their products outfitted with the technology.

Load More